- sistemazioni Email : registrazione, invio invito, email di benvenuto
- fix circuito - profilo
This commit is contained in:
@@ -334,7 +334,7 @@ router.post('/sendmailreg', authenticate, async (req, res) => {
|
||||
const diffTime = Math.abs(now - user.lasttime_email_sent_verify);
|
||||
const diffMinutes = Math.ceil(diffTime / (1000 * 60));
|
||||
|
||||
if (diffMinutes < 1) {
|
||||
if (diffMinutes < 5) {
|
||||
return res.status(200).send({ email_inviata: false, error: 'Attendi qualche minuto prima di reinviare nuovamente.' });
|
||||
}
|
||||
ris = await sendemail.sendEmail_Registration(user.lang, user.email, user, user.idapp, user.linkreg);
|
||||
@@ -396,7 +396,7 @@ router.post('/settable', authenticate, async (req, res) => {
|
||||
(await !tools.ModificheConsentite(req, params.table, fieldsvalue, mydata ? mydata._id : ''))
|
||||
) {
|
||||
// If without permissions, exit
|
||||
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
}
|
||||
|
||||
if (shared_consts.TABLES_USER_ID.includes(params.table)) {
|
||||
@@ -827,7 +827,7 @@ router.post('/getexp', authenticate, (req, res) => {
|
||||
|
||||
if (!User.isAdmin(req.user.perm) && !User.isManager(req.user.perm) && !User.isFacilitatore(req.user.perm)) {
|
||||
// If without permissions, exit
|
||||
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
}
|
||||
|
||||
try {
|
||||
@@ -1334,7 +1334,7 @@ router.patch('/chval', authenticate, async (req, res) => {
|
||||
!(mydata.table === 'accounts' && (await Account.canEditAccountAdmins(req.user.username, mydata.id)))
|
||||
) {
|
||||
// If without permissions, exit
|
||||
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
}
|
||||
|
||||
const camporequisiti = UserCost.FIELDS_REQUISITI.includes(Object.keys(fieldsvalue)[0]);
|
||||
@@ -1617,7 +1617,7 @@ router.patch('/askfunz', authenticate, async (req, res) => {
|
||||
req.user._id.toString() !== id
|
||||
) {
|
||||
// If without permissions, exit
|
||||
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1676,7 +1676,7 @@ router.patch('/callfunz', authenticate, async (req, res) => {
|
||||
req.user._id.toString() !== id
|
||||
) {
|
||||
// If without permissions, exit
|
||||
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1755,7 +1755,7 @@ router.delete('/delrec/:table/:id', authenticate, async (req, res) => {
|
||||
(await !tools.ModificheConsentite(req, tablename, fields, id, req.user))
|
||||
) {
|
||||
// If without permissions, exit
|
||||
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
}
|
||||
|
||||
let cancellato = false;
|
||||
@@ -1863,7 +1863,7 @@ router.post('/duprec/:table/:id', authenticate, async (req, res) => {
|
||||
const mytable = globalTables.getTableByTableName(tablename);
|
||||
|
||||
if (!req.user) {
|
||||
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
|
||||
}
|
||||
|
||||
/* if (!User.isAdmin(req.user.perm) && !User.isManager(req.user.perm)) {
|
||||
@@ -1902,7 +1902,7 @@ router.post('/duprec/:table/:id', authenticate, async (req, res) => {
|
||||
|
||||
router.get('/loadsite/:userId/:idapp', authenticate_noerror_WithUserLean, async (req, res) => {
|
||||
try {
|
||||
// if ((req.statuscode2 = server_constants.RIS_CODE_HTTP_FORBIDDEN_TOKEN_EXPIRED)) {
|
||||
// if ((req.statuscode2 = server_constants.RIS_CODE_HTTP_TOKEN_EXPIRED)) {
|
||||
// return;
|
||||
// }
|
||||
|
||||
@@ -2031,8 +2031,8 @@ async function load(req, res, version = '0') {
|
||||
// Estrazione e validazione degli input
|
||||
const userId = req.user ? req.user._id.toString() : req.params.userId || '0';
|
||||
const idapp = req.params.idapp;
|
||||
/*const status = req.code === server_constants.RIS_CODE_HTTP_FORBIDDEN_TOKEN_EXPIRED
|
||||
? server_constants.RIS_CODE_HTTP_FORBIDDEN_TOKEN_EXPIRED
|
||||
/*const status = req.code === server_constants.RIS_CODE_HTTP_TOKEN_EXPIRED
|
||||
? server_constants.RIS_CODE_HTTP_TOKEN_EXPIRED
|
||||
: 200;*/
|
||||
|
||||
let status = req.code;
|
||||
@@ -2251,11 +2251,10 @@ async function load(req, res, version = '0') {
|
||||
}
|
||||
}
|
||||
|
||||
router.get(process.env.LINK_CHECK_UPDATES, authenticate_noerror, async (req, res) => {
|
||||
router.get('/checkupdates', authenticate_noerror, async (req, res) => {
|
||||
try {
|
||||
const idapp = req.query.idapp;
|
||||
|
||||
// console.log("POST " + process.env.LINK_CHECK_UPDATES + " userId=" + userId);
|
||||
if (!req.user) {
|
||||
if (req.code === 1) return res.status(200).send();
|
||||
else return res.status(req.code).send();
|
||||
|
||||
Reference in New Issue
Block a user